Control: 5.2.7 Ensure that multifactor authentication is required to access Microsoft Admin Portals
Description
This recommendation ensures that users accessing Microsoft Admin Portals (i.e. Microsoft 365 Admin, Microsoft 365 Defender, Exchange Admin Center, Azure Portal, etc.) are required to use multi-factor authentication (MFA) credentials when logging into an Admin Portal.
Administrative Portals for Microsoft Azure should be secured with a higher level of scrutiny to authenticating mechanisms. Enabling multi-factor authentication is recommended to reduce the potential for abuse of Administrative actions, and to prevent intruders or compromised admin credentials from changing administrative settings.
Remediation
Remediate from Azure Portal
- From the Azure Admin Portal dashboard, open
Microsoft Entra ID. - Click
Securityin the Entra ID blade. - Click
Conditional Accessin the Security blade. - Click
Policiesin the Conditional Access blade. - Click
+ New policy. - Enter a name for the policy.
- Click the blue text under
Users. - Under
Include, selectAll users. - Under
Exclude, checkUsers and groups. - Select users or groups to be exempted from this policy (e.g. break-glass emergency accounts, and non-interactive service accounts) then click the
Selectbutton. - Click the blue text under
Target resources. - Under
Include, click the Select apps radio button. - Click the blue text under
Select. - Check the box next to
Microsoft Admin Portalsthen click theSelectbutton. - Click the blue text under
Grant. - Under
Grant accesscheck the box forRequire multifactor authenticationthen click theSelectbutton. - Before creating, set
Enable policytoReport-only. - Click
Create.
After testing the policy in report-only mode, update the Enable policy setting from Report-only to On.
Default Value
By default, no Conditional Access policy specifically requires MFA for Microsoft Admin Portals.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v500_5_2_7Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v500_5_2_7 --shareSQL
This control uses a named query:
with distinct_tenant as ( select distinct tenant_id, display_name, subscription_id, _ctx from azure_tenant),conditional_access_policy as ( select tenant_id, count(*) as conditional_access_policy_count from azuread_conditional_access_policy where users -> 'includeUsers' ? 'All' and applications -> 'includeApplications' ? 'MicrosoftAdminPortals' and built_in_controls @> '[1]'::jsonb and state = 'enabled' group by tenant_id)select t.tenant_id as resource, case when conditional_access_policy_count > 0 then 'ok' else 'alarm' end as status, case when conditional_access_policy_count > 0 then t.display_name || ' has conditional access policy that requires MFA for All users (or admin roles) when accessing admin portals.' else t.display_name || ' does not have a conditional access policy that requires MFA for All users (or admin roles) when accessing admin portals.' end as reason, t.tenant_id from distinct_tenant as t left join conditional_access_policy as p on p.tenant_id = t.tenant_id;